About your Search

20130416
20130424
Search Results 0 to 7 of about 8
is the in recess for their weekly party caucuses. they will return at 2:15 for more work on then line sales tax bill. a motion to proceed on the bill could come tomorrow unless an agreement is reached today. learn more about your senators with c-span's 2013 congressional direct at this. it is available to order online. a handy guide to the current congress. has information about each member of the hoist and senate. it includes contact information, district maps and committee asassignments. the directory is 12.95 plus shipping and handling and order online. a short time ago we spoke with a capitol hill reporter with the latest on the legislation the senate is debating today on the internet sales tax. gautham nagesh from roll call on capitol hill. what is the purpose of this internet sales bill? >> it would require states online retailers, charge sales tax and collect and remit them when consumers make a purchase online. that includes retailers not within their own state. >> who are some of the bill's supporters and why do some of them say it will level the playing field for retailers? >> well, t
into vbms. the veteran will go online, which exists today, file their claim, like their taxes -- apropos to say that today -- it goes directly into vbms, and we completed that whole piece this year in january, without advertising it. we have 500 claims a week going into the system, directly into vbms, and allows us to work them.it never turns into paper. today we have 3% electronic.-- we do not have three percent in paper anymore. we have 14% of our paper that has been converted to electronic since january.i have more than 116,000 electronic claims now, electronic folders, that we did not have at the beginning of this year, so we're moving along in the process. this week i will have another six offices on the new i.t. system. >> thank you. >> mr. secretary, the v.a. backlog reduction plan shows in order to eliminate it by 2015, v.a. will need to decide 1.2 million claims this year, 1.6 million next year, and 1.9 million claims in 2015. v.a. is saying it will decide 335,000 fewer claims in 2013 and 2014.that is in the budget submission. can the v.a. reach 2 million claims in 2015? that wo
't been up front with my taxes. this would prevent d.h.s. from say sharing that information with the internal revenue service? guest: the private companies in sharing information, the biggest concern is -- individuals are concerned that their private information within the cyber networks or systems would be held by private companies but then provided to the government, that this private information would not be stripped by the companies first. in the president's executive order, the onus would be on the privacy advocates. companiesthe private to strip any private information that might be caught up within the context of cyber threat information. first one has to understand the definition of cyber threat. it is unlikely but not impossible that your private tax information, your e-mail content would be part of that information that is a cyber threat information that would be given to the government. is there a possibility that it would be lumped in with that? yes. so whose responsibility is it to minimize and get rid of your private information? the bill does not allow the gov
program activities, which covers the entire extent. every one of those had to be equally taxed. the congress imposed a more onerous, morerestrictiverra money from ppa to ppa.my ato m i have these small but not a lot oney anof them are only people. for whatever reason, they decided there needed to be more control over the national intelligence program. the effect of the fy 13 appropriations i did help as assume that it allowed us to move some money around city could move the money into the pot sorority committed to by virtue the fact we are fragments months of the fiscal year before regarded though. it would've been a disaster without it. the downside to allow start, which was good, but for most accounts with three specific exceptions, which i can't discuss here, with less money at the end of the day with the appropriations act and the impact of sequestration was doubled because we had to take and 79, said the rail cut fares about her 10%. >> the realistic impact is helpful. it provided a context to things they might be allowed to do. we have a macro issue of the sequestration,
that covers the entire extent. every one of those had to be eat late taxed. the congress imposed a more onerous, more restrict it from a comma rules that on my ability to move money from ppa to ppa. i have small pdas with not a lot of money but for whatever reason decided there needed to be more over the national intelligence program. the effect of the fy 13 of her rations that did help us in that it allowed us to move money around civic and that the money into the path we are committed to by virtue of the fact were five men in before we got a bill. sowo ba dister t it. a cab structure, did allow new start,t also frommocountschss here was what many at the endf the day and of course the of sequestration was doubled because we had to take it in seven months. iraq i was. ealistic impact. >> that is helpful because it provides more of a context of things we might be able to do. again, we have a macro issue of sequestration can watch everyone recognizes it's in packs on your programs. but i stand legislative authorization not on this committee that the intelligence that could have the skinny
of it comes from the drug trade. some probably 35 or 40%. some money comes from illicit taxes from afghan people and some money comes from external support from outside the region. >> when you look at the places that they go in pakistan, the frontier areas, double pakistan, -- do you believe pakistan, number one, has control over those areas and number two, can control over those areas? >> senator, pakistan does not have control over those areas right now. they have had over 15,000 killed and wounded in operations in that area over the past decade. they've had hundreds killed and wounded in the past several weeks as they've tried to gain control in the khyber area. i think that's a clear indication they cannot control the border area and the taliban that are operating freely inside of that border area. >> what do you see as a rule for the taliban, if any, in the future afghan government as we transition out, as discussions are taking place. how do you envision that future afghan government? obviously there are elections coming up but how are we looking at the transition for the afghan gov
of it comes from the drug trailed. some probably 35 or 40%. some money comes from illicit taxes from afghan people and some money comes from external support from outside the region. >> when you look at the places that they go in pakistan, the frontier areas, double pakistan, number one, has control over those areas and number two, can control over those areas? >> senator, pakistan does not have control over those areas right now. they have had over 15,000 killed and wounded in operations in that area over the past decade. they've had hundreds killed and wounded in the past kefrl weeks that is -- as they've tried to gain control in the khyber area. i think that's a clear indication they cannot control the border area and the taliban that are operating freely inside of that border area. >> what do you see as a rule for the taliban, if any, in the future afghan government as we transition out, as discussions are taking place. how do you envision that future afghan government? obviously there are elections coming up but how are we looking at the transition for the afghan government? >> the sta
in cyberspace, and are widely believed already to be responsible for some such a tax. china and russia possess formidable capabilities for cyber theft, such as the theft of valuable intellectual property as well as the more traditional areas of espionage, such as spying on our military weapon systems, plans and capabilities. china in particular appears to observe no limit of the theft of american commercial technology. that's cyber theft as a threat that cannot be tolerated. i hope we'll hear from our witnesses about the extent of the problem, and the steps that we can and should take to counter it. the asia-pacific region, another round of belligerence from the dictatorial regime in north korea has caused concern here in the united states, and among our allies in the pacific. that regime has announced its intention to resume a plutonium production, has tested a nuclear device in february that appears to have had a greater yield than previous tests. and has threatened at any time to launch a missile that uld further exacerbatenons. we have read about conflicting intelligence assessments, north
Search Results 0 to 7 of about 8